CLOP Ransomware gang has targeted over 21 organizations from March to April this year and the numbers might increase as the time progresses. According to a survey conducted by NCC Group, CLOP returned in February this year from a hiatus of almost 16 months and is now only after industrial sector.
CLOP is seen infecting mostly firms operating in the industrial sector and that too mainly those partnering with US Companies.
In June last year, CLOP gang members announced that there were shutting down their business as earnings from cyber attacks were decreasing on a drastic note. All thanks to the law enforcement groups like CISA, FBI, NCSC and Europol. As the noose around those laundering cryptocurrency was being tightened by law enforcement agencies such as INTERPOL, it was getting difficult for the hackers to gain money from targets.
Recently, after the start of war between Russia and Ukraine, six gang members belonging to CLOP were arrested by Ukrainian authorities after making through searchers for them in various regions of Kyiv.
Intel 471 states that CLOP claimed approximately 7 victims in 2019, that includes Software Giant AG IT, ExecuPharm, Indiabulls, Maastricht University and Accellion software.
Britain has also tightened its noose around the necks of gangs spreading file encrypting malware and is using many techniques to block their earnings from various means.
Eventually, such steps have worked in the favor of the Biden led government as many ransomware spreading gangs such as CONTI have announced that there are leaving the business because of a significant drop in earnings.
CLOP went into a hiatus till January this year and might have probably regained strength after the start of Putin’s war with Zelensky led nation, as it seems like it resumed its notorious operations from March 2022.